In Zero Trust architecture, devices should not be treated as invisible transport. They contribute to the confidence of the access decision and influence how much trust an organisation can reasonably place in a request.
That is why device identity and trust matter. A strong model distinguishes between managed and unmanaged devices, recognises different trust states, and uses device context as part of policy rather than assuming the network or location is enough.
Device Trust In Practice
Most organisations have to make Zero Trust work across a mix of device patterns:
Why This Matters
For many organisations, the practical challenge is not deciding whether device trust matters. It is deciding how to apply it in a mixed environment that includes corporate devices, remote work, contractors, legacy dependencies, and changing endpoint strategies.
That often means defining:
- where stronger device trust is required
- where limited or conditional access is acceptable
- how policy should respond to differing trust states
- how endpoint models can evolve without disrupting access to critical systems